SELinux - Date Index
[Prev Page][Next Page]
- Re: Semantics vs. usage of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Semantics vs. usage of mutex_is_locked()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Semantics vs. usage of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: parse contexts for mount options early
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: add policy utilities
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH] checkpolicy: allow wildcard permissions in constraints
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: add policy utilities
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: add sepol_av_perm_to_string
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.17 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.17 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace v2 6/6] semodule: add command-line option to detect module changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 5/6] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 3/6] libsemanage: move compressed file handling into a separate object
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 4/6] libsemanage: clean up semanage_direct_commit() a bit
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/6] Optionally rebuild policy store only if there were external changes to modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/6] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v32 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 25/28] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 23/28] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 17/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 16/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 07/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 04/28] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: do not add gaps to string list
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: fix double free of cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: parse contexts for mount options early
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: fix double free of cond_list on error paths
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Vratislav Bendel <vbendel@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: remove duplicate cond_list clean up calls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: kmod and unsigned modules
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- kmod and unsigned modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3 2/2] selinux: try to use preparsed sid before calling parse_sid()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH v3 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH v3 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] selinux: Fix and clean policydb->cond_list error paths
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: do not add gaps to string list
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Populate and use policy name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Populate and use policy name
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- [PATCH 3/3] selinux: remove duplicate cond_list clean up calls
- [PATCH 1/3] selinux: consistently clear cond_list on error paths
- [PATCH 2/3] selinux: fix double free of cond_list on error paths
- [PATCH 0/3] selinux: Fix and clean policydb->cond_list error paths
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: invert only valid range of role bitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: drop trailing newlines in log messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: return failure on saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] libselinux: Prevent cached context giving wrong results
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: handle argument counter of zero
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 9/9] selinux: drop unused macro
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/9] selinux: simplify cred_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 7/9] selinux: do not discard const qualifier in cast
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH 6/9] selinux: drop unused parameter of avtab_insert_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/9] selinux: drop cast to same type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/9] selinux: declare name parameter of hash_eval const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: handle argument counter of zero
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 2/9] selinux: declare path parameters of _genfs_sid const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH 9/9] selinux: drop unused macro
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH v3] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: invert only valid range of role bitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [RFC PATCH] selinux: split no transition execve check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: drop trailing newlines in log messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: return failure on saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/9] selinux: drop unused parameter of avtab_insert_node
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/9] selinux: drop cast to same type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 9/9] selinux: drop unused macro
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 8/9] selinux: simplify cred_init_security
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 7/9] selinux: do not discard const qualifier in cast
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/9] selinux: declare name parameter of hash_eval const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/9] selinux: declare path parameters of _genfs_sid const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: invert only valid range of role bitmap
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] libsepol: handle type gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Cached security context not accurate
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 3/5] libsemanage: move compressed file handling into a separate object
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC v2 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC v2 2/2] selinux: try to use preparsed sid before calling parse_sid()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [libselinux][PATCH] libselinux: make threadsafe for discover_class_cache
- From: Purushottam Choudhary <purushottamchoudhary29@xxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/4 v2] libsepol/cil: Limit the amount of reporting for context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4 v2] libsepol/cil: Limit the neverallow violations reported
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4 v2] libsepol/cil: Provide more control over reporting bounds failures
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4 v2] libsepol/cil: Add cil_get_log_level() function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: drop trailing newlines in log messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: return failure on saturated class name length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH RFC] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] libsepol: check for saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: reject invalid roles before inverting
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Strip spaces before values in config
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re:[PATCH] selinux: check the return value of audit_log_start()
- From: "Xiaoke Wang" <xkernel.wang@xxxxxxxxxxx>
- [PATCH] selinux: check the return value of audit_log_start()
- From: xkernel.wang@xxxxxxxxxxx
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Limit the amount of reporting for context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 3/5] libsemanage: move compressed file handling into a separate object
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 1/5] libsemanage: add missing include to boolean_record.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 0/5] Allow rebuilding policy store only if there were external changes to modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add epub build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] selinux-notebook: Add epub build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: check for saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] ci: run the tests under ASan/UBsan on GHActions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2 RFC] libsepol/cil: Add notself and minusself support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2 RFC] libsepol: Add not self support for neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2 RFC] libsepol: Adding support for not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 16/16 v2] libsepol: Fix two problems with neverallowxperm reporting
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 15/16 v2] libsepol: Set args avtab pointer when reporting assertion violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 14/16 v2] libsepol: The src and tgt must be the same if neverallow uses self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 13/16 v2] libsepol: Make return value clearer when reporting neverallowx errors
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 12/16 v2] libsepol: Refactor match_any_class_permissions() to be clearer
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 11/16 v2] libsepol: Make use of previously created ebitmap when checking self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 10/16 v2] libsepol: Move assigning outer loop index out of inner loop
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 09/16 v2] libsepol: Remove unnessesary check for matching class
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 06/16 v2] libsepol: Move check of target types to before check for self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 07/16 v2] libsepol: Create function check_assertion_self_match() and use it
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 08/16 v2] libsepol: Use (rc < 0) instead of (rc) when calling ebitmap functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 03/16 v2] libsepol: Remove uneeded error messages in assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 04/16 v2] libsepol: Check for error from check_assertion_extended_permissions()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 05/16 v2] libsepol: Use consistent return checking style
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 02/16 v2] libsepol: Change label in check_assertion_avtab_match()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 01/16 v2] libsepol: Return an error if check_assertion() returns an error.
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.17
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for v5.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol: check for saturated class name length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: handle type gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- ANN: Reference Policy 2.20220106
- From: Chris PeBenito <pebenito@xxxxxxxx>
- Re: [PATCH] ci: run the tests under ASan/UBsan on GHActions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsepol/cil: Do not resolve names to declarations in abstract blocks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/3] libsepol/cil: Mark as abstract all sub-blocks of an abstract block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: check for valid sensitivity before lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: bail out on snprintf failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: check for valid sensitivity before lookup
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: handle type gaps when optimizing
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: bail out on snprintf failure
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#4)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.16 (#4)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: initialize proto variable in selinux_ip_postroute_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: initialize proto variable in selinux_ip_postroute_compat()
- [PATCH] libsepol: handle type gaps when optimizing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: check for valid sensitivity before lookup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: check for valid sensitivity before lookup
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: minor tweaks to selinux_add_opt()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: minor tweaks to selinux_add_opt()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Granting myself access on oss-fuzz issue reports
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] security/selinux: fix potential memleak in error branch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Granting myself access on oss-fuzz issue reports
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] ci: run the tests under ASan/UBsan on GHActions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: bail out on snprintf failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#3)
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#3)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#3)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] SELinux fixes for v5.16 (#3)
- From: Olga Kornievskaia <aglo@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#3)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.16 (#3)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 00/16] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 08/16] libsepol: Use (rc < 0) instead of (rc) when calling ebitmap functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 16/16] libsepol: Fix two problems with neverallowxperm reporting
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 15/16] libsepol: Set args avtab pointer when reporting assertion violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 14/16] libsepol: The src and tgt must be the same if neverallow uses self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 13/16] libsepol: Make return value clearer when reporting neverallowx errors
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 12/16] libsepol: Refactor match_any_class_permissions() to be clearer
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 11/16] libsepol: Make use of previously created ebitmap when checking self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 10/16] libsepol: Move assigning outer loop index out of inner loop
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 09/16] libsepol: Remove unnessesary check for matching class
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 07/16] libsepol: Create function check_assertion_self_match() and use it
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 06/16] libsepol: Move check of target types to before check for self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 05/16] libsepol: Use consistent return checking style
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 04/16] libsepol: Check for error from check_assertion_extended_permissions()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 03/16] libsepol: Remove uneeded error messages in assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 02/16] libsepol: Change label in check_assertion_avtab_match()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 01/16] libsepol: Return an error if check_assertion() returns an error.
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 00/16] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: support IPv4/IPv6 address embedding
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: Fix sleeping function called from invalid context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: Add epub build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] selinux-notebook: Add epub build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: Fix sleeping function called from invalid context
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] selinux: Fix sleeping function called from invalid context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3 11/36] libsepol: enforce avtab item limit
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] selinux: Fix sleeping function called from invalid context
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] selinux: check the return value of audit_log_start()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v31 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v31 14/28] LSM: Specify which LSM to display
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a wrong check condition of strcmp()
- From: "Xiaoke Wang" <xkernel.wang@xxxxxxxxxxx>
- Re: [PATCH] selinux: fix a wrong check condition of strcmp()
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] selinux: fix a wrong check condition of strcmp()
- From: xkernel.wang@xxxxxxxxxxx
- Re: [PATCH v31 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v31 26/28] Audit: Add record for multiple object security contexts
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v31 26/28] Audit: Add record for multiple object security contexts
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] selinux: check the return value of audit_log_start()
- From: xkernel.wang@xxxxxxxxxxx
- Re: [PATCH V2 4/4] selinux-notebook: Add epub build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] src/images: Add new SELinux penguin
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v31 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 25/28] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 23/28] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 22/28] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 21/28] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 20/28] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 19/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 18/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 17/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 16/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] selinux-notebook: Make file links consistent
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 11/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 07/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4] selinux-notebook: New chapter: Hardening SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v31 05/28] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 04/28] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v31 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH V2 2/4] src/images: Remove current penguin
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/4] selinux-notebook: Make file links consistent
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 4/4] selinux-notebook: Add epub build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 3/4] src/images: Add new SELinux penguin
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/4] SELinux Notebook: Add eBook reader build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] secilc: kernel policy language is infix
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v4] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 0/4] SELinux Notebook: Add eBook reader build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- overlay userxattr seems to not adhere to defaultrole
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 2/4] src/images: Remove current penguin
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] SELinux Notebook: Add eBook reader build
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] security/selinux: fix potential memleak in error branch
- From: Bernard Zhao <bernard@xxxxxxxx>
- [PATCH 4/4] selinux-notebook: Add epub build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/4] SELinux Notebook: Add eBook reader build
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/4] src/images: Remove current penguin
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/4] selinux-notebook: Make file links consistent
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] checkpolicy: warn on bogus IP address or netmask in nodecon statement
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: support IPv4/IPv6 address embedding
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/5 v2] libsepol: Add support for file types in writing out policy.conf
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v3 35/36] libsepol: validate fsuse types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 25/36] libsepol: validate permission count of classes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 13/36] libsepol: reject abnormal huge sid ids
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 19/36] libsepol: do not crash on user gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 31/36] libsepol: validate genfs contexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 30/36] libsepol: validate ocontexts
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 24/36] libsepol: validate expanded user range and level
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 17/36] libsepol: do not underflow on short format arguments
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 06/36] libsepol: use logging framework in conditional.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 16/36] libsepol: use size_t for indexes in strs helpers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 27/36] libsepol: validate avtab and avrule types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 11/36] libsepol: enforce avtab item limit
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 23/36] libsepol: validate MLS levels
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 05/36] libsepol/fuzz: limit element sizes for fuzzing
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 03/36] libsepol/fuzz: silence secilc-fuzzer
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 14/36] libsepol: reject invalid filetrans source type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 21/36] libsepol: do not create a string list with initial size zero
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 01/36] cifuzz: enable report-unreproducible-crashes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 34/36] libsepol: validate categories
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 32/36] libsepol: validate permissive types
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 33/36] libsepol: validate policy properties
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 36/36] libsepol: validate class default targets
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 22/36] libsepol: split validation of datum array gaps and entries
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 26/36] libsepol: resolve log message mismatch
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 18/36] libsepol: do not crash on class gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 28/36] libsepol: validate constraint expression operators and attributes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 20/36] libsepol: use correct size for initial string list
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 08/36] libsepol: use mallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 12/36] libsepol: clean memory on conditional insertion failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 00/36] libsepol: add fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 02/36] cifuzz: use the default runtime of 600 seconds
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 07/36] libsepol: use logging framework in ebitmap.c
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 04/36] libsepol: add libfuzz based fuzzer for reading binary policies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 29/36] libsepol: validate type of avtab type rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 15/36] libsepol: zero member before potential dereference
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 10/36] libsepol: add checks for read sizes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3 09/36] libsepol: use reallocarray wrapper to avoid overflows
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] security/selinux: fix potential memleak in error branch
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v3] selinux-notebook: New chapter: Hardening SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v3] selinux-notebook: New chapter: Hardening SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] selinux-notebook: New chapter: Hardening SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 7/7] title.md: Clarify example code location
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 6/7] policy_config_files.md: Update snapperd_contexts contents
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 5/7] policy_config_files.md: Update openssh_contexts contents
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/7] policy_config_files.md: Update openrc_contexts contents
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 3/7] object_classes_permissions.md: Deprecate lockdown class
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 2/7] object_classes_permissions.md: Correct the context object class entry
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 1/7] notebook: Minor formatting fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] security: Remove security_add_mnt_opt() as it's unused
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] security: Remove security_add_mnt_opt() as it's unused
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] security: Remove security_add_mnt_opt() as it's unused
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] security, nfs: Provide a hook for fs_context security initialisation
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC PATCH 1/2] security: Remove security_add_mnt_opt() as it's unused
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH V2 5/7] policy_config_files.md: Update openssh_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 3/7] object_classes_permissions.md: Deprecate lockdown class
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 7/7] title.md: Clarify example code location
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 2/7] object_classes_permissions.md: Correct the context object class entry
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 0/7] Various SELinux Notebook updates
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 6/7] policy_config_files.md: Update snapperd_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 1/7] notebook: Minor formatting fixes
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V2 4/7] policy_config_files.md: Update openrc_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- 答复: [PATCH v2] security/selinux: fix potential memleak in error branch
- From: 赵军奎 <bernard@xxxxxxxx>
- 答复: [PATCH] security/selinux: fix potential memleak
- From: 赵军奎 <bernard@xxxxxxxx>
- Re: [PATCH] security,selinux: remove security_add_mnt_opt()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 5/7] policy_config_files.md: Update openssh_contexts contents
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] security,selinux: remove security_add_mnt_opt()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 5/5] libsepol: pass avtab to report function
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] security,selinux: remove security_add_mnt_opt()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] security,selinux: remove security_add_mnt_opt()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] security/selinux: fix potential memleak
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] security/selinux: fix potential memleak in error branch
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] security/selinux: fix potential memleak in error branch
- From: Bernard Zhao <bernard@xxxxxxxx>
- 答复: [PATCH] security/selinux: fix potential memleak in error branch
- From: 赵军奎 <bernard@xxxxxxxx>
- Re: [PATCH] security/selinux: fix potential memleak in error branch
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security/selinux: fix potential memleak
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: Use struct_size() helper in kmalloc()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 25/28] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 23/28] Audit: Create audit_stamp structure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 03/28] LSM: Add the lsmblob data structure.
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] checkpolicy: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v3 5/5] libsepol: pass avtab to report function
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v3 3/5] checkpolicy: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v3 4/5] libsepol: free ebitmap on end of function
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v3 2/5] libsepol: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v3 1/5] libsepol: introduce ebitmap_relative_complement()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] libsepol: add not-self neverallow support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 3/4] checkpolicy: add not-self neverallow support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH 6/7] policy_config_files.md: Update snapperd_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 7/7] title.md: Clarify example code location
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 4/7] policy_config_files.md: Update openrc_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 5/7] policy_config_files.md: Update openssh_contexts contents
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 0/7] Various SELinux Notebook updates
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 2/7] object_classes_permissions.md: Correct the context object class entry
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 3/7] object_classes_permissions.md: Deprecate lockdown class
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH 1/7] notebook: Minor formatting fixes
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: Use struct_size() helper in kmalloc()
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH] security/selinux: fix potential memleak
- From: Bernard Zhao <bernard@xxxxxxxx>
- [PATCH] security/selinux: fix potential memleak in error branch
- From: Bernard Zhao <bernard@xxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Replace PCRE with PCRE2 build dependencies
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: use PCRE2 by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: introduce ebitmap_subtract()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: introduce ebitmap_subtract()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol/cil: support IPv4/IPv6 address embedding
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] checkpolicy: warn on bogus IP address or netmask in nodecon statement
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: introduce ebitmap_subtract()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Fix selinux_restorecon_parallel symbol version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] semodule: Don't forget to munmap() data
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Modified Russian and English man pages to fix typo; REQUIREUSERS -> REQUIRESEUSERS
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH XSERVER 2/2] selinux: log events with appropriate audit type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH XSERVER 1/2] selinux: remap security classes on policyload
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: free ebitmap on end of function
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH V2 testsuite] tests/inet_socket: Add socket transition tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v30 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] libsepol: free ebitmap on end of function
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/4] checkpolicy: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/4] libsepol: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/4] libsepol: introduce ebitmap_subtract()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH V2] netlabel: Update man page to clarify SELinux labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] netlabel: Update man page to clarify SELinux labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v30 14/28] LSM: Specify which LSM to display
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/3] libselinux: use PCRE2 by default
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Jari Ruusu <jariruusu@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 222/279] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 5.10 130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] binder: fix test regression due to sender_euid change
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Modified Russian and English man pages to fix typo; REQUIREUSERS -> REQUIRESEUSERS
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v30 26/28] Audit: Add record for multiple object security contexts
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] Modified Russian and English man pages to fix typo; REQUIREUSERS -> REQUIRESEUSERS
- From: Jacob M Cutright <cutrightjm@xxxxxx>
- [PATCH v30 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 25/28] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 23/28] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 22/28] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 21/28] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 20/28] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 19/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 18/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 17/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 16/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 07/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 05/28] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 04/28] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.16 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux fixes for v5.16 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH 3/3] checkpolicy: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/3] libsepol: add not-self neverallow support
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/3] libsepol: introduce ebitmap_subtract()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/3] Replace PCRE with PCRE2 build dependencies
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libselinux: use PCRE2 by default
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] mcstrans: port to new PCRE2 from end-of-life PCRE
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] semodule: Don't forget to munmap() data
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] semodule: Don't forget to munmap() data
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Fix selinux_restorecon_parallel symbol version
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libselinux: Fix selinux_restorecon_parallel symbol version
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix lang_ext column index
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] semodule: add -m | --checksum option
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH userspace v4 0/8] Parallel setfiles/restorecon
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH userspace v4 0/8] Parallel setfiles/restorecon
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v4 0/8] Parallel setfiles/restorecon
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH 2/2] dbus: Add filetrans for /tmp/dbus-* session socket
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- [PATCH 1/2] selinux: Add map perms
- From: Jason Zaman <jason@xxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH] binder: fix test regression due to sender_euid change
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] binder: fix test regression due to sender_euid change
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Kernel policy language is infix
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux: fix NULL-pointer dereference when hashtab allocation fails
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] Kernel policy language is infix
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH] selinux: fix NULL-pointer dereference when hashtab allocation fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] semodule: Fix lang_ext column index
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semodule: add -m | --checksum option
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: David Anderson <dvander@xxxxxxxxxx>
- Re: [PATCH 01/12] checkpolicy: use correct unsigned format specifiers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: David Anderson <dvander@xxxxxxxxxx>
- Re: [PATCH V2] netlabel: Update man page to clarify SELinux labeling
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: David Anderson <dvander@xxxxxxxxxx>
- [PATCH testsuite] tests/inet_socket: Add socket transition tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 4/4] overlayfs: inode_owner_or_capable called during execv
- From: David Anderson <dvander@xxxxxxxxxx>
- [PATCH v19 3/4] overlayfs: override_creds=off option bypass creator_cred
- From: David Anderson <dvander@xxxxxxxxxx>
- [PATCH v19 2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method
- From: David Anderson <dvander@xxxxxxxxxx>
- [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: David Anderson <dvander@xxxxxxxxxx>
- [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: David Anderson <dvander@xxxxxxxxxx>
- Re: [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH V2] netlabel: Update man page to clarify SELinux labeling
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: Add netlink xperm support
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] netlabel: Update man page to clarify SELinux labeling
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] semodule: Fix lang_ext column index
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] semodule: add -m | --checksum option
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] ci: run the tests under ASan/UBsan on GHActions
- From: Evgeny Vereshchagin <evvers@xxxxx>
- [RFC PATCH] capability: add capable_or to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] binder: fix test regression due to sender_euid change
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: Bram Bonné <brambonne@xxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Alistair Delva <adelva@xxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH 01/12] checkpolicy: use correct unsigned format specifiers
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [RFC PATCH] libsepol,checkpolicy: Add netlink xperm support
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Alistair Delva <adelva@xxxxxxxxxx>
- [PATCH v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Alistair Delva <adelva@xxxxxxxxxx>
- Re: [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Bart Van Assche <bvanassche@xxxxxxx>
- [PATCH] block: Check ADMIN before NICE for IOPRIO_CLASS_RT
- From: Alistair Delva <adelva@xxxxxxxxxx>
- Re: [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Use IANA-managed domain example.com in examples
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] net,lsm,selinux: revert the security_sctp_assoc_established() hook
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [GIT PULL] SELinux fix / revert for v5.16 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- Re: [PATCH] Support static-only builds
- From: Alyssa Ross <hi@xxxxxxxxx>
- [PATCH v2] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [GIT PULL] SELinux fix / revert for v5.16 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] net,lsm,selinux: revert the security_sctp_assoc_established() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] binder: fix test regression due to sender_euid change
- From: Todd Kjos <tkjos@xxxxxxxxxx>
- Re: [PATCH 4.4 2/2] binder: use cred instead of task for selinux checks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4.4 2/2] binder: use cred instead of task for selinux checks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/12] libsemanage: add extern prototype for legacy function
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 11/12] libsemanage: include paired header for prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 10/12] libsemanage: mark local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 09/12] mcstrans: avoid missing prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 08/12] python: mark local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 07/12] sandbox: mark local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 06/12] policycoreutils: mark local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 05/12] checkpolicy: ignore possible string truncation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 04/12] Enable extra global compiler warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 03/12] policycoreutils: use string literal as format strings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 02/12] libsepol: use string literals as format strings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 01/12] checkpolicy: use correct unsigned format specifiers
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux-notebook: New chapter: Hardening SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux-notebook: New chapter: Hardening SELinux
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH net] selinux: fix SCTP client peeloff socket labeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] Support static-only builds
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libsepol: avoid passing NULL pointer to memcpy
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
- Re: [PATCH v2] libselinux: use valid address to silence glibc 2.34 warnings
- From: Nicolas Iooss <nicolas.iooss@xxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]